Home

Description

The Easy Digital Downloads plugin for WordPress is vulnerable to Order Manipulation in all versions up to, and including, 3.5.2 due to an order verification bypass. The verification is unconditionally skipped when the POST body includes verification_override=1. Because this value is attacker-supplied, an unauthenticated actor can submit a forged IPN and have it treated as verified, even on production sites and with verification otherwise enabled. A valid PayPal transaction id is needed, restricting order manipulation to orders placed by the attacker. This, in turn, requires them to have a customer account.

PUBLISHED Reserved 2025-10-03 | Published 2025-11-06 | Updated 2025-11-06 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-807 Reliance on Untrusted Inputs in a Security Decision

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-10-03:Vendor Notified
2025-11-05:Disclosed

Credits

Jamie Davies finder

References

www.wordfence.com/...-9413-47ea-a740-441618266adf?source=cve

github.com/...ads/blob/main/includes/gateways/paypal/ipn.php

github.com/...ownloads/blob/main/src/Gateways/PayPal/IPN.php

plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=

cve.org (CVE-2025-11271)

nvd.nist.gov (CVE-2025-11271)

Download JSON